Some of the attacks implemented will cause a DoS in a network, other will help to perform any other more advanced attack, or both.
In addition, some of them will be first released to the public since there isn’t any public implementation.

Yersinia will definitely help both pen-testers and network administrators in their daily tasks.

Some of the mentioned attacks are DoS attacks, so TAKE CARE about what you’re doing because you can convert your network into an UNSTABLE one.

A lot of examples are given at this page EXAMPLES section, showing a real and useful program execution.

GTK GUI
The GTK GUI (-G) is a GTK graphical interface with all of the yersinia powerful features and a professional
’look and feel’.

NCURSES GUI
The ncurses GUI (-I) is a ncurses (or curses) based console where the user can take advantage of yersinia
powerful features.

Press ’h’ to display the Help Screen and enjoy your session :)

NETWORK DAEMON
The Network Daemon (-D) is a telnet based server (ala Cisco mode) that listens by default in port 12000/tcp
waiting for incoming telnet connections.

It supports a CLI similar to a Cisco device where the user (once authenticated) can display different settings and can launch attacks without having yersinia running in her own machine (specially useful for Windows users).

Start a Spanning-Tree nonDoS root claiming attack in the first nonloopback interface (keep in mind that this kind of attack will use the first BPDU on the network interface to fill in the BPDU fields properly):